Claim Missing Document
Check
Articles

Found 25 Documents
Search

IMPLEMENTASI ALGORITMA APRIORI PADA ANALISA POLA DATA PENYAKIT MANUSIA YANG DISEBABKAN OLEH ROKOK Waruwu, Fince Tinus; Buulolo, Efori; Ndruru, Eferoni
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.492

Abstract

Berdasarkan berbagai kasus yang terjadi bahwa penyakit yang disebabkan oleh merokok lebih dari satu jenis penyakit atau komplikasi. Untuk mengetahui pola penyakit yang disebabkan rokok sangat perlu menganalisa pola penyakit dengan menganalisa data-data pasien pada Rumah Sakit. Rokok produk yang berbahaya & adiktif (menimbulkan ketergantungan). Di dalam rokok terdapat 4000 bahan kimia berbahaya yang 69 diantaranya merupakan zat karsinogenik (dapat menimbulkan kanker). Zat-zat berbahaya yang terkandung didalam rokok antara lain seperti tar, karbon monoksida, sianida, arsen, formalin, nitrosamine dan lainnya. algoritma apriori bisa melakukan penelusuran pada data historis untuk mengidentifikasi pola data yang didasarkan pada sifat-sifat yang teridentifikasi sebelumnya. Penelitian lainnya mengatakan algoritma Apriori salah satu bentuk terapan data mining yang menghasilkan model pengetahuan berupa aturan dengan nilai confidence. Model pengetahuan tersebut dapat digunakan untuk memprediksi kecenderungan data yang akan datang.
ALOKASI PEKERJA PADA SUATU PROYEK DENGAN METODE HUNGARIAN (STUDI KASUS: PT. IRA WIDYA UTAMA MEDAN) Ndruru, Eferoni; Waruwu, Fince Tinus; Yanny, Anda
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.500

Abstract

The allocation of workers is very much needed by the company. But in reality the company is difficult to place employees in every allocation. But with the development of existing technology, it can be minimized by calculating the cost of each worker and each allocation by utilizing existing data and extraction to generate new knowledge. Implementation of operational research techniques using hungarian methods and tested using a system or application as a decision tree to assign some decent workers to be placed on existing jobs within the company. The extension process can show the group of employee data that fall into the category of workers and the allocation so as to optimize the costs that are out by the company. So PT.Ira Widya Utama Medan can be a reference to take decisions in assigning and allocating employees next.
Penerapan Aplikasi Ujian Akhir Semester Menggunakan Metode Computerized Classification Dengan Addaptive Feedback Tampubolon, Tigor Barata; Buulolo, Efori; Ndruru, Eferoni
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2678

Abstract

The world of education is experiencing a very rapid development which is supported by innovations that were born from the development of information technology, including the application of online examinations. The examination system during midterm and end-of-semester exams is still conventional, which means that exams are carried out using paper (Paper-Based Test) which is wasteful of paper and time. The online examination system (Computerized Classification Test) is part of an educational information system that has implemented information technology by offering efficiency and effectiveness. In this study, the authors created an online exam system. This online exam system development method uses addaptive feedback, namely direct assessment without waiting a long time to find out the value, the online exam system provides benefits, namely there is no need to procure exam papers and save time for exam corrections so that efficiency and effectiveness are the goals of making the test system. online can be achieved.Keywords: Online Examination, System, Application, CCT, Addaptive Feedback
PENERAPAN ALGORITMA NEAREST NEIGHBOR DALAM MEMPREDIKSI KELAYAKAN PENERIMAAN KARTU KREDIT PADA BANK CIMB NIAGA Ndruru, Eferoni; Zebua, Taronisokhi
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i1.410

Abstract

A credit card application is a financial facility that allows a person or business entity to borrow money to buy a product and pay it back within a specified time. Credit card manufacture often experiences risk in providing credit, both moderate, good and very good risk, due to lack of data analysis and lack of attention. So the purpose of this study is to analyze the risks that often occur in making credit cards. And provide efficient solutions. In solving this problem, it is necessary to apply the method. The method used in this study is Nearest Neighbor. The Nearest Neighbor algorithm is an approach to finding cases by calculating the proximity between new cases (testing data) and old cases (training data), which is based on matching the weights of a number of existing features. Therefore, it can be applied in analyzing old customer data with data new so that comparisons can be made whether or not it is eligible to receive credit. The results obtained in this study are the results of testing systems and methods by producing a level of risk.
Perancangan Aplikasi Keamanan Data Dengan Kombinasi Algoritma Kriptografi RC4 Dan One Time Pad Anas, Irfan; Ginting, Guidio Leonarde; Ndruru, Eferoni; Sembiring, Abdul Sani; Zebua, Taronisokhi
JURIKOM (Jurnal Riset Komputer) Vol 8, No 1 (2021): Februari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i5.2541

Abstract

Data is an important aspect that has important information in it, which includes numbers, characters, symbols, pictures, sounds, or other signs that can be used as information. Data are certain facts, thus producing information. Cryptography is often used to secure and encode text data, messages, or other information, so using cryptographic algorithms on text data is able to secure data that is very important to everyone. So the expected results from the RC4 Cryptography algorithm and One Time Pad, which are used in text data can help in securing or encoding very important text data, so that the text is not easy to read or know the original message.
Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4 Taronisokhi Zebua; Eferoni Ndruru
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 4 No 4: Desember 2017
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (694.928 KB) | DOI: 10.25126/jtiik.201744474

Abstract

AbstrakCitra digital yang bersifat pribadi dan rahasia sangat rentang terhadap penyadapan oleh pihak-pihak lain, terutama bila citra tersebut didistribusikan melalui internet. Tindakan penyadapan dan penyalahgunaan terhadap citra yang sifatnya rahasia tentu saja dapat merugikan pihak pemilik citra. Salah satu teknik untuk meminimalkan tindakan tersebut di atas adalah pemanfaatan teknik kriptografi. Teknik kriptografi dapat mengamankan citra digital dengan cara modifikasi nilai-nilai pixel citra sehingga citra yang dihasilkan berbeda dengan citra asli. Algoritma RC4 dapat digunakan sebagai salah satu algoritma dalam mewujudkan tujuan teknik kriptografi. Namun algoritma ini memiliki kelemahan di mana pemecahan algoritma ini dengan know plaintext attack atau know ciphertext only dapat dilakukan dengan mudah. Penelitian ini menguraikan pengamanan citra digital berdasarkan modifikasi algoritma RC4. Modifikasi yang dilakukan adalah menambahkan sebuah blok intial vector pada proses enkripsi maupun dekripsi serta melakukan pemindahan sejumlah bit pada posisi tertentu. Hasil penelitian ini adalah citra digital dengan nilai-nilai pixel yang jauh berbeda dengan nilai pixel aslinya dengan tujuan dapat mempersulit pihak lain dalam memanipulasi citra rahasia.Kata kunci: kriptografi, citra, algoritma, RC4, cipher aliran.AbstractDigital images of a private and confidential verry extend to wiretapping by other parties, especially when the image is distributed over the internet. The tapping or misuse of the confidential private image of course, harm the image owner. One technique to minimize the above measures is the utilization of cryptographic techniques. Cryptography techniques can secure digital images by modifying the image pixel values so that the resulting image is different from the original image. RC4 algorithm can be used in realizing the purpose of cryptographic technique. But this algorithm has a weakness where the solving of this algorithm with know plaintext attack or know ciphertext only can be done easily. This research describes the security of digital images based on RC4 algorithm modification. The modification is to add a initial vector block in the process of encryption and decryption and shift a number of bits in a certain position. The results of this research is a digital image with pixel values that are much different from the original pixel value to make it difficult for others in manipulating the secret image.Keywords: cryptography, image, algorithm, RC4, stream cipher.
Application of Text Message Held in Image Using Combination of Least Significant Bit Method and One Time Pad Eferoni Ndruru; Taronisokhi Zebua
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 13, No 4 (2019): October
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.46401

Abstract

Stenography and security are one of the techniques to develop art in securing data. Stenography has the most important aspect is the level of security in data hiding, which makes the third party unable to detect some information that has been secured. Usually used to hide textinformationThe (LSB) algorithm is one of the basic algorithms proposed by Arawak and Giant in 1994 to determine the frequent item set for Boolean association rules. A priory algorithm includes the type of association rules in data mining. The rule that states associations between attributes are often called affinity analysis or market basket analysis. OTP can be widely used in business. With the knowledge of text message, concealment techniques will make it easier for companies to know the number of frequencies of sales data, making it easier for companies to take an appropriate transaction action. The results of this study, hide the text message on the image (image) by using a combination of LSB and Otp methods.
Generate Beaufort Cipher Key Based on Blum-Blum Shub For Secure Digital Image Eferoni Ndruru
Bahasa Indonesia Vol 13 No 02 (2021): Instal : Jurnal Komputer
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data security is not only due to the complexity of the algorithms used, but one of the most important factors is the security of the keys used. One of the most popular data that needs to be backed up today is digital images. However, these days, the algorithms used to back up data are often attacked. This is because the structure of the key formations used is still weak. One of the data security algorithms that form a simple key is the Beaufort cipher. It relies on the duplication of key characters to form the key for each protected element. Key generators based on blum-blum shub technology can generate very random and difficult-to-guess keys, so the strength of the keys you use can enhance the resilience of protected data. Keys generated based on blum-blum shub technology will later be used in the process of encrypting and decrypting pixel values ​​in digital images.
PENERAPAN METODE ARAS DALAM PEMILIHAN LOKASI OBJEK WISATA YANG TERBAIK PADA KABUPATEN NIAS SELATAN Eferoni Ndruru; Eviyanti Novita Purba
METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi Vol. 3 No. 2 (2019): METHOMIKA: Jurnal Manajemen Informatika & Komputersisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (385.723 KB) | DOI: 10.46880/jmika.Vol3No2.pp151-159

Abstract

Keindahan suatu objek wisata merupakan salah satu tujuan utama para wisatawan dalam menghabiskan liburan mereka dan selain keindahan masih banyak lagi yang membuat para wisatawa tertarik. Objek wisatawa yang semakin banyak dan keindahan yang berbeda-beda, serta perlengkapan yang lengkap, sehingga para wisatawan merasa sulit untuk menentkan objek wisata yang terbaik berdarkan kelengkapan fasilitas dan keindahan wisata yang akan mereka kunjungin. Selama ini banyak pendatang baru atau para wisatawan yang merasa kesal dalam mengujungi berbagai objek wisata khususnya dikabupaten nias selatan yang disebabkan belum mengetahui keindahan objek wisata tersebut. Dari permasalahan tersebut diperlukan sistem pendukung keputusan yang dapat membantu para wisatawan dalam menentukan objek wisata yang terbaik sehingga mereka tidak sia-sia dalam mengujinginya. Dalam penyelesaian sistem pendukung keputusan tersebut diperlukan metode dalam menguji data kuantitatif. Metode yang digunakan adalah metode Additive Ratio Assessment (ARAS) merupakan metode pengambilan keputusan dalam perangkingan kriteria yang menggunakan prinsip bahwa alternatif yang terpilih harus mempunyai jarak terdekat dengan solusi ideal positif dan jarak terjauh dengan solusi ideal negatif dengan melakukan pembobotan setiap kriteria. Hasil yang akan didapat dalam penelitian ini adalah hasil perangkingan jenis objek wisata yang paling tertinggi yang di dapat dalam perhitungan metode Aras. Sehingga dari nilai perangkingan dapat memberikan informasi objek mana saja yang akan mendekati objek wisata yang terbaik. Dan bahasa pemrograman yang digunakan adalah bahasa pemrograma microsoft visual basic net 2008.
Message Security on Chat App based on Massey Omura Algorithm Taronisokhi Zebua; Rivalri Kristianto Hondro; Eferoni Ndruru
IJISTECH (International Journal of Information System and Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v1i2.11

Abstract

Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed